(18.117.92.13)
Users online: 12405     
Ijournet
Email id
 

Journal of Innovation in Computer Science and Engineering
Year : 2012, Volume : 2, Issue : 1
First page : ( 34) Last page : ( 39)
Print ISSN : 2278-0947. Online ISSN : 2455-3506.

Low Power Design for Cryptographic Applications in Dual Fields

Ippalapalli Venu., Raju Srinivasa

Department of Electronics and Communication, CVSR College of Engineering, Jodimetla, A.P.

Online published on 27 June, 2017.

Abstract

In the information security within an organization have major changes in computer security and network security. The information security has three aspects i.e. security attack, security mechanism and security service. In the distributed systems, network or communication techniques will provide security. In this security related transformation and some secret information has to be shared by the two parties. Encryption process consist algorithm and key. In encryption process each algorithm produce different outputs based on the keys. Cryptographic algorithms[2] will provide security over distributed systems. In the recent years the implementation of cryptographic algorithms over GF(2m), GF(pm), p_2 and GF(p), p large prime. Cryptographic processor handles the operations for elliptic curve cryptosystems, and the software to generate it. It implements a ROM instruction set for reducing the hardware complexity. Efficient scheduling of the data is used to determine the optimum resource requirement for the processor.

Top

Keywords

Information security, Encryption, Cryptographic algorithms, Finite fields, Elliptic curve Cryptosystems.

Top

 
║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
750,555,146 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.